News

2022-08-23

Xiaomi Phone Bug Enables Theft

A flaw in smartphone maker Xiaomi's operating software could lead to mobile transactions being disabled, replicated and forged.

2022-08-23

BlackByte Ransomware Group Have An Update

Version 2.0: Blackbyte are back with advanced new extortion techniques that include a data leak website modelled on Lockbit.

2022-08-23

Technology To Combat Human Trafficking

AI, Facial Recognition & Blockchain: There are a growing number of ways in which technology can be applied to combat human trafficking.

2022-08-23

Ransomware Used Against Albania Linked To Iran

Roadsweep & Zeroclear: Albania's experience highlights the vulnerability of IT infrastructure that lacks resilience against sophisticated malware.

2022-08-22

Lazarus Targets FinTech Engineers With MacOS Malware

Lazarus group is using a malicious macOS exploit to impersonate Coinbase with fake job posting to lure unwitting workers in the FinTech sector.

2022-08-19

Artificial Intelligence Can Improve Cyber Security

Essential: Effective AI can save money and reduce the risk of breaches as organisations face an ever expanding number of vulnerable endpoints.

2022-08-20

Ukraine Knocks Out A Russian Bot Network

Ukraine's security services claim to have stopped a network operating over a million bot accounts distributing fake news to destabilise the nation. 

2022-08-22

Re-strategising Resilience In The Remote Working Age

It’s time to stop adding tools and complexity and start building security operations where cyber security experts are truly empowered. By Rob Smith

2022-08-22

Protecting Medical Devices From Cyber Attacks

Medical Device Cyber Security: Medical devices need robust cyber security which is critical in retaining patient trust in health care technology. 

2022-08-19

Blockchain Auditors Say $4m Crypto Theft Enabled By Logging Tech

A $4 million hack on several crypto currency wallet providers is attributed to a misconfiguration in a widely-used event-logging technology.

2022-08-17

Killnet Turn Their Attention To Lockheed Martin

Hackers targeted the supply of Lockheed Martin's advanced HIMARS rocket artillery supplied to Ukraine for use against Russian invaders.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

RISA

RISA

RISA solutions help to secure networks, improve overall network security, and achieve government regulatory compliance.

Quttera

Quttera

Quttera provides Website Security Solutions for Small & Medium Businesses, Enterprises and Organizations.

National Cyber Security Centre Finland (NCSC-FI)

National Cyber Security Centre Finland (NCSC-FI)

The NCSC-FI develops and monitors the operational reliability and security of communications networks and services in Finland.

Adeptis Group

Adeptis Group

Adeptis are experts in cyber security recruitment, providing bespoke staffing solutions to safeguard your organisation against ever-changing cyber threats.

Cyber Aware

Cyber Aware

Cyber Aware aims to drive behaviour change amongst small businesses and individuals, so that they adopt simple secure online behaviours.

Future of Cyber Security Europe

Future of Cyber Security Europe

Future of Cyber Security Europe is a European wide event examining the latest cyber security strategies and technologies.

Council for Information & Communication Technologies (CTIC)

Council for Information & Communication Technologies (CTIC)

CTIC was set up to address specific issues in the field of ICT relevant to the implementation of electronic government.

European Cyber Security Conference

European Cyber Security Conference

EU Cyber Security Conference will debate what Europe’s response to evolving threats in a dynamic global risk landscape should look like and what the next steps for all actors of the ecosystem.

Specops Software

Specops Software

Specops Software is a leading password management and authentication solution vendor.

UK Research & Innovation (UKRI)

UK Research & Innovation (UKRI)

UKRI works in partnership with universities, research organisations, businesses, charities, and government to create the best possible environment for research and innovation to flourish.

Allthenticate

Allthenticate

Allthenticate Single Device Authentication (SDA), enables seamless authentication in both the physical and digital words while unifying management in one easy-to-use interface.

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

Point Predictive

Point Predictive

Point Predictive build Predictive Models using Artificial Intelligence and Machine Learning techniques that help our customers stop fraud and early payment default (EPD).

Palmchip

Palmchip

Palmchip is a Cyber Security, SOC and Software consulting company. We design and develop high performance and secure applications.

Zitec

Zitec

One of Europe's largest and most prominent full-cycle software development services companies, Zitec is the digital transformation partner to companies in the EU, UK, USA, Canada and ME.

ThingsRecon

ThingsRecon

ThingsRecon empowers organisations to continuously map and manage their attack surface, uncover hidden vulnerabilities, and assess supplier cyber hygiene.